Implementation of operating system securing

a technology of operating system and security, applied in the field of operating system security, can solve the problems of increasing costs, increasing risks, and increasing risks to the security of operating system and applications, and costing the global economy tens of billions of dollars annually

Inactive Publication Date: 2009-02-19
MOTOROLA SOLUTIONS INC
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]The present invention relates to a method of securing an operating system. For a first application to be instantiated on the operating system, at least a first recommended value for a configuration line item can be received from a first security template. For a second application to be instantiated on the operating system, at least a second recomm

Problems solved by technology

Presently, software security is at the forefront of computer related issues.
Throughout the evolution of networking and the Internet, threats to the security of operating systems and applications have risen dramatically.
Indeed, it is estimated that security breaches now cost the global econom

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Implementation of operating system securing
  • Implementation of operating system securing
  • Implementation of operating system securing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014]The present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, including firmware, resident software, micro-code, etc., or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,”“module,” or “system.”

[0015]Furthermore, the invention may take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by, or in connection with, a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer-readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by, or in connection with, the instruction execution system, apparatus, or device.

[0016]Any suitable computer-usable or computer-readable medium may be utilized. For example, the medium can include, but is not limited to, an electronic, magnetic, opt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method (200, 300) of securing an operating system. The method can include, for a first application to be instantiated on the operating system, receiving from a first security template (106) at least a first recommended value for a configuration line item. The method also can include, for a second application to be instantiated on the operating system, receiving a second security template at least a second recommended value for the configuration line item. From among at least the first and second values, at least one value that is compatible with each of the applications can be selected. Further, an output (120) can be generated that automatically updates the configuration line item with the selected at least one value.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention generally relates to operating systems and, more particularly, to operating system security.[0003]2. Background of the Invention[0004]Presently, software security is at the forefront of computer related issues. Throughout the evolution of networking and the Internet, threats to the security of operating systems and applications have risen dramatically. Indeed, it is estimated that security breaches now cost the global economy tens of billion of dollars annually and the costs continue to grow. The hardening of software, especially operating systems, has therefore become very critical to modern day computing.[0005]A variety of standards have been developed to define suitable methods of hardening operating systems against security threats. One example of such a standard is the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG). Implementation of a hardening standa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06N5/02
CPCG06F21/6281
Inventor LOHRBACH, JEFFREY G.MUHLENKAMP, LEWIS J.REED, JONATHAN F.
Owner MOTOROLA SOLUTIONS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products